Skip to main content

Attacks Against Security Context in 5G Network

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1644))

Included in the following conference series:

Abstract

The security context used in 5G authentication is generated during the Authentication and Key Agreement (AKA) procedure and stored in both the user equipment (UE) and the network sides for the subsequent fast registration procedure. Given its importance, it is imperative to formally analyze the security mechanism of the security context. The security context in the UE can be stored in the Universal Subscriber Identity Module (USIM) card or in the baseband chip. In this work, we present a comprehensive and formal verification of the fast registration procedure based on the security context under the two scenarios in ProVerif. Our analysis identifies two vulnerabilities, including one that has not been reported before. An attacker can exploit these vulnerabilities to register to the network with the victim’s identity and then launch other attacks. To ensure that these attacks are indeed realizable in practice, we have responsibly confirmed them through experimentation in three operators. Our analysis reveals that these vulnerabilities stem from design flaws of the standard and unsafe practices by operators. We finally propose several potential countermeasures to prevent these attacks. We have reported our findings to the GSMA and received a coordinated vulnerability disclosure (CVD) number CVD-2022-0057.

Supported by the National Natural Science Foundation of China (No. 62001055 and 61872386), and the Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Center.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 3GPP: Non-access-stratum (nas) protocol for 5g system. Technical Report, 24.501

    Google Scholar 

  2. 3GPP: Non-access-stratum (nas) protocol for evolved packet system (eps). Technical Report, 24.301

    Google Scholar 

  3. 3GPP: Characteristics of the universal subscriber identity module (usim) application. Technical Report, 31.102

    Google Scholar 

  4. 3GPP: 3gpp system architecture evolution (SAE); security architecture. Technical Report, 33.401

    Google Scholar 

  5. 3GPP: Security architecture and procedures for 5g system. Technical Report, 33.501

    Google Scholar 

  6. Schneider, P., Horn, G.: Towards 5g security. In: 2015 IEEE Trustcom/BigDataSE/ISPA, pp. 1165–1170. IEEE (2015)

    Google Scholar 

  7. Shaik, A., Borgaonkar, R., Park, S., Seifert, J.P.: New vulnerabilities in 4g and 5g cellular access network protocols: exposing device capabilities. In: 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp. 221–231. ACM (2019)

    Google Scholar 

  8. Zhao, J., Ding, B., Guo, Y., Tan, Z., Lu, S.: Securesim: rethinking authentication and access control for sim/esim. In: 27th Annual International Conference on Mobile Computing and Networking, pp. 451–464. ACM (2021)

    Google Scholar 

  9. Blanchet, B., et al.: Modeling and verifying security protocols with the applied pi calculus and proverif. Found. Trends® Privacy Secur. 1(1–2), 1–135 (2016)

    Google Scholar 

  10. Savoldi, A., Gubian, P.: Sim and usim filesystem: a forensics perspective. In: the 2007 ACM Symposium on Applied Computing, pp. 181–187. ACM (2007)

    Google Scholar 

  11. Nie, S., Zhang, Y., Wan, T., Duan, H., Li, S.: Measuring the deployment of 5g security enhancement. In: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 169–174. ACM (2022)

    Google Scholar 

  12. Lowe, G.: A hierarchy of authentication specifications. In: 10th Computer Security Foundations Workshop, pp. 31–43. IEEE (1997)

    Google Scholar 

  13. Gomez-Miguelez, I., Garcia-Saavedra, A., Sutton, P.D., Serrano, P., Cano, C., Leith, D.J.: srslte: an open-source platform for LTE evolution and experimentation. In: 10th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization, pp. 25–32. ACM (2016)

    Google Scholar 

  14. Zhou, Z., Han, X., Chen, Z., Nan, Y., Li, J., Gu, D.: Simulation: demystifying (insecure) cellular network based one-tap authentication services. In: 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 534–546. IEEE (2022)

    Google Scholar 

  15. Meyer, U., Wetzel, S.: On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks. In: 15th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 2876–2883. IEEE (2004)

    Google Scholar 

  16. Rupprecht, D., Kohls, K., Holz, T., Pöpper, C.: Imp4gt: impersonation attacks in 4g networks. In: NDSS (2020)

    Google Scholar 

  17. Zheng, Y., Huang, L., Shan, H., Li, J., Yang, Q., Xu, W.: Ghost Telephonist impersonates you: Vulnerability in 4g LTE CS fallback. In: 2017 IEEE Conference on Communications and Network Security (CNS), pp. 1–9. IEEE (2017)

    Google Scholar 

  18. Liu, J., et al.: Small tweaks do not help: differential power analysis of MILENAGE implementations in 3G/4G USIM cards. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 468–480. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24174-6_24

    Chapter  Google Scholar 

  19. New simjacker vulnerability exploited by surveillance companies for espionage operation. https://simjacker.com/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baojiang Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cui, Z., Cui, B., Su, L., Du, H., Wang, H., Fu, J. (2023). Attacks Against Security Context in 5G Network. In: You, I., Kim, H., Angin, P. (eds) Mobile Internet Security. MobiSec 2022. Communications in Computer and Information Science, vol 1644. Springer, Singapore. https://doi.org/10.1007/978-981-99-4430-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-4430-9_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-4429-3

  • Online ISBN: 978-981-99-4430-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics